CN1617492A - 提供服务的系统和方法 - Google Patents

提供服务的系统和方法 Download PDF

Info

Publication number
CN1617492A
CN1617492A CNA2004100749295A CN200410074929A CN1617492A CN 1617492 A CN1617492 A CN 1617492A CN A2004100749295 A CNA2004100749295 A CN A2004100749295A CN 200410074929 A CN200410074929 A CN 200410074929A CN 1617492 A CN1617492 A CN 1617492A
Authority
CN
China
Prior art keywords
smart card
key
sensitive data
application program
kcp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2004100749295A
Other languages
English (en)
Chinese (zh)
Inventor
奥利维尔·翁德特
亨利·吉尔伯特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
France Telecom SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=34130360&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN1617492(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by France Telecom SA filed Critical France Telecom SA
Publication of CN1617492A publication Critical patent/CN1617492A/zh
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)
  • Communication Control (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
CNA2004100749295A 2003-09-03 2004-09-01 提供服务的系统和方法 Pending CN1617492A (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP03292168A EP1513113B2 (fr) 2003-09-03 2003-09-03 Système et procédé pour la communication sécurisée basé sur cartes à puce
EP03292168.6 2003-09-03

Publications (1)

Publication Number Publication Date
CN1617492A true CN1617492A (zh) 2005-05-18

Family

ID=34130360

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2004100749295A Pending CN1617492A (zh) 2003-09-03 2004-09-01 提供服务的系统和方法

Country Status (7)

Country Link
US (1) US7587599B2 (fr)
EP (1) EP1513113B2 (fr)
JP (1) JP2005080315A (fr)
CN (1) CN1617492A (fr)
AT (1) ATE332549T1 (fr)
DE (1) DE60306648T2 (fr)
ES (1) ES2268296T3 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403985B (zh) * 2008-05-04 2011-03-30 北京深思洛克软件技术股份有限公司 一种对软件保护装置中的软件许可进行备份的方法
CN104009977A (zh) * 2014-05-09 2014-08-27 北京奇虎科技有限公司 一种信息保护的方法和系统
CN105245526A (zh) * 2015-10-19 2016-01-13 中国联合网络通信集团有限公司 调用sim卡应用的方法与装置
CN102752750B (zh) * 2005-12-30 2016-08-03 英特尔公司 使用基于可信平台的共享秘密推导和基于wwan基础设施的登记来建立本地安全信道
CN110378097A (zh) * 2014-09-26 2019-10-25 英特尔公司 保障传感器数据安全

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080075756A1 (en) * 2004-06-30 2008-03-27 Advanced Medical Optics, Inc. Enhancement of lens regeneration using materials comprising polymers
EP1811452B1 (fr) * 2004-11-08 2010-04-21 Sony Corporation Systeme de traitement d'informations et dispositif de traitement d'informations
JP4781692B2 (ja) * 2005-03-08 2011-09-28 インターナショナル・ビジネス・マシーンズ・コーポレーション クライアントのi/oアクセスを制限する方法、プログラム、システム
US9553848B2 (en) * 2005-04-06 2017-01-24 Broadcom Corporation Secure conditional access and digital rights management in a multimedia processor
US20090044007A1 (en) * 2005-04-07 2009-02-12 France Telecom Secure Communication Between a Data Processing Device and a Security Module
CN101317181B (zh) * 2005-10-21 2010-05-19 诺基亚公司 用于移动终端中安全鉴权响应的设备以及方法
US7747861B2 (en) * 2005-11-09 2010-06-29 Cisco Technology, Inc. Method and system for redundant secure storage of sensitive data by using multiple keys
WO2007074557A1 (fr) * 2005-12-26 2007-07-05 Mitsubishi Electric Corporation Système de distribution de contenu, terminal et serveur
US7639237B2 (en) * 2006-03-03 2009-12-29 Perkins Michael T Roll-out touch screen support system (ROTS3)
US7464865B2 (en) * 2006-04-28 2008-12-16 Research In Motion Limited System and method for managing multiple smart card sessions
JP5137474B2 (ja) * 2006-06-23 2013-02-06 株式会社半導体エネルギー研究所 個人情報管理システム及び管理システム
WO2007148768A1 (fr) 2006-06-23 2007-12-27 Semiconductor Energy Laboratory Co., Ltd. Système de gestion de données personnelles et carte mémoire non volatile
WO2008009094A1 (fr) 2006-07-19 2008-01-24 Research In Motion Limited Procédé, système et lecteur de carte à puce pour la gestion de l'accès à la carte à puce
US7766243B2 (en) * 2006-07-19 2010-08-03 Research In Motion Limited Method, system and smart card reader for management of access to a smart card
US20090249492A1 (en) * 2006-09-21 2009-10-01 Hans Martin Boesgaard Sorensen Fabrication of computer executable program files from source code
WO2008034900A1 (fr) * 2006-09-21 2008-03-27 Boesgaard Soerensen Hans Marti Fabrication de fichiers de programme exécutables par ordinateur à partir d'un code source
US8468351B2 (en) 2006-12-15 2013-06-18 Codesealer Aps Digital data authentication
US9569587B2 (en) 2006-12-29 2017-02-14 Kip Prod Pi Lp Multi-services application gateway and system employing the same
US20230057851A1 (en) * 2006-12-29 2023-02-23 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US11316688B2 (en) 2006-12-29 2022-04-26 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US9602880B2 (en) * 2006-12-29 2017-03-21 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US11783925B2 (en) 2006-12-29 2023-10-10 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US20170344703A1 (en) 2006-12-29 2017-11-30 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US8856289B2 (en) 2006-12-29 2014-10-07 Prodea Systems, Inc. Subscription management of applications and services provided through user premises gateway devices
US20090028329A1 (en) * 2007-07-23 2009-01-29 Savi Technology, Inc. Method and Apparatus for Providing Security in a Radio Frequency Identification System
US20090126027A1 (en) * 2007-11-08 2009-05-14 Rambus, Inc. File accessing and retrieval using soft digital rights management technology
US20090177884A1 (en) * 2008-01-04 2009-07-09 Benica Corporation Digital content security system, portable steering device and method of securing digital contents
DE102008000067C5 (de) * 2008-01-16 2012-10-25 Bundesdruckerei Gmbh Verfahren zum Lesen von Attributen aus einem ID-Token
WO2009125919A1 (fr) * 2008-04-10 2009-10-15 Lg Electronics Inc. Terminal et procédé de gestion de dispositifs sécurisés
US20090260071A1 (en) * 2008-04-14 2009-10-15 Microsoft Corporation Smart module provisioning of local network devices
EP2113856A1 (fr) * 2008-04-29 2009-11-04 Tiny Industries ApS Stockage sécurisé de données utilisateur dans des dispositifs adaptés aux UICC et Smart Card
GB0811897D0 (en) * 2008-06-30 2008-07-30 Steed Darren Intelligent file encapsulation
JP5449905B2 (ja) 2009-07-29 2014-03-19 フェリカネットワークス株式会社 情報処理装置、プログラム、および情報処理システム
DE102010013201A1 (de) * 2010-03-29 2011-09-29 Giesecke & Devrient Gmbh Verfahren zum Zuordnen einer ersten Datenträgereinheit zu einer zweiten Datenträgereinheit
US8713314B2 (en) * 2011-08-30 2014-04-29 Comcast Cable Communications, Llc Reoccuring keying system
US9215591B2 (en) 2012-12-06 2015-12-15 At&T Intellectual Property I, L.P. Security for network load broadcasts over cellular networks
JP6393988B2 (ja) * 2013-02-28 2018-09-26 株式会社リコー 機器、情報処理システム、制御方法、プログラム、および記憶媒体
US9396355B2 (en) 2013-12-17 2016-07-19 International Business Machines Corporation Multi-part encrypted messages for support of sensitive systems
US9264899B2 (en) * 2013-12-19 2016-02-16 Nxp, B.V. Binding mobile device secure software components to the SIM
US9584492B2 (en) * 2014-06-23 2017-02-28 Vmware, Inc. Cryptographic proxy service
US9910655B1 (en) * 2014-11-06 2018-03-06 Accellion, Inc. Secure content platform software developer kit
WO2016112338A1 (fr) * 2015-01-08 2016-07-14 Intertrust Technologies Corporation Systèmes et procédés cryptographiques
CN104980580B (zh) * 2015-06-17 2018-03-23 小米科技有限责任公司 短信息查看方法及装置
EP3282738A1 (fr) * 2016-08-11 2018-02-14 Gemalto Sa Procédé de liaison d'une application de terminal à un élément de sécurité et élément de protection correspondant, application de terminal et serveur

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5221838A (en) * 1990-12-24 1993-06-22 Motorola, Inc. Electronic wallet
DE4119924C3 (de) * 1991-06-17 1996-06-20 Siemens Ag Verfahren zur Sicherung von ladbaren Guthaben in Chipkarten
FR2718312B1 (fr) * 1994-03-29 1996-06-07 Rola Nevoux Procédé d'authentification combinée d'un terminal de télécommunication et d'un module d'utilisateur.
EP0936812A1 (fr) * 1998-02-13 1999-08-18 CANAL+ Société Anonyme Procédé et appareil d'enregistrement de données numériques cryptées
FR2794595B1 (fr) * 1999-06-03 2002-03-15 Gemplus Card Int Pre-controle d'un programme dans une carte a puce additionnelle d'un terminal
JP2000347566A (ja) * 1999-06-08 2000-12-15 Mitsubishi Electric Corp コンテンツ管理装置、コンテンツ利用者端末及びプログラムを記録したコンピュータ読み取り可能な記録媒体
JP3873090B2 (ja) * 1999-12-02 2007-01-24 三洋電機株式会社 データ記録装置、データ供給装置およびデータ配信システム
US20010045451A1 (en) * 2000-02-28 2001-11-29 Tan Warren Yung-Hang Method and system for token-based authentication
JP4243932B2 (ja) * 2001-07-09 2009-03-25 パナソニック株式会社 コンテンツ管理システムおよび情報記録媒体
US20030009681A1 (en) * 2001-07-09 2003-01-09 Shunji Harada Digital work protection system, recording medium apparatus, transmission apparatus, and playback apparatus
CN1311456C (zh) * 2001-07-19 2007-04-18 皇家菲利浦电子有限公司 用于再生用户数据的设备和方法
JP3933003B2 (ja) * 2002-07-30 2007-06-20 株式会社日立製作所 Icカードおよび決済端末

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752750B (zh) * 2005-12-30 2016-08-03 英特尔公司 使用基于可信平台的共享秘密推导和基于wwan基础设施的登记来建立本地安全信道
CN101403985B (zh) * 2008-05-04 2011-03-30 北京深思洛克软件技术股份有限公司 一种对软件保护装置中的软件许可进行备份的方法
CN104009977A (zh) * 2014-05-09 2014-08-27 北京奇虎科技有限公司 一种信息保护的方法和系统
WO2015169158A1 (fr) * 2014-05-09 2015-11-12 北京奇虎科技有限公司 Procédé et système de protection d'informations
CN104009977B (zh) * 2014-05-09 2016-10-05 北京奇虎科技有限公司 一种信息保护的方法和系统
CN110378097A (zh) * 2014-09-26 2019-10-25 英特尔公司 保障传感器数据安全
CN110378097B (zh) * 2014-09-26 2024-06-04 英特尔公司 保障传感器数据安全
CN105245526A (zh) * 2015-10-19 2016-01-13 中国联合网络通信集团有限公司 调用sim卡应用的方法与装置
CN105245526B (zh) * 2015-10-19 2018-06-19 中国联合网络通信集团有限公司 调用sim卡应用的方法与装置

Also Published As

Publication number Publication date
US20050086479A1 (en) 2005-04-21
JP2005080315A (ja) 2005-03-24
ES2268296T3 (es) 2007-03-16
US7587599B2 (en) 2009-09-08
EP1513113B1 (fr) 2006-07-05
EP1513113B2 (fr) 2011-02-23
ATE332549T1 (de) 2006-07-15
EP1513113A1 (fr) 2005-03-09
DE60306648T2 (de) 2007-06-21
DE60306648D1 (de) 2006-08-17

Similar Documents

Publication Publication Date Title
CN1617492A (zh) 提供服务的系统和方法
CN1592307A (zh) 用于分发数据的系统和方法
EP1530885B1 (fr) Gestion de droits numeriques robuste et flexible a module d'identite inviolable
CN100343844C (zh) 数据配送装置和数据配送用的终端装置
CN1209718C (zh) 操纵计算机文件和/或程序的系统和方法
US20040101141A1 (en) System and method for securely installing a cryptographic system on a secure device
CN1961370A (zh) 基于数字权限管理重放内容的方法和设备及便携式存储器
CN1742276A (zh) 本地共享多媒体内容订阅的系统和方法
CN1879102A (zh) 在便携式存储器和装置之间重放基于数字版权管理的内容的方法和设备及其便携式存储器
CN1728038A (zh) 提供权限数据对象的方法
CN1977490A (zh) 存储媒体处理方法、存储媒体处理装置以及程序
CN1930818A (zh) 改进的域管理器和域设备
CN1728633A (zh) 提供访问加密内容的方法和设备及产生加密内容包的方法
US20120303967A1 (en) Digital rights management system and method for protecting digital content
CN1640178A (zh) 服务器设备、通信装置以及用于限制内容使用的程序
US20070183598A1 (en) Apparatus for managing DRM installation and method thereof
CN1610295A (zh) 使用便携式存储装置用于管理数字权限的方法和设备
CN112954000A (zh) 一种基于区块链和ipfs技术的隐私信息管理方法及系统
CN101140610A (zh) 使用drm卡的内容解密方法
CN101065942A (zh) 用于从第一终端单元向第二终端单元迁移特定加密访问对象的方法和设备
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
CN101057447A (zh) 用于从服务器向移动终端设备重新分发特定编码访问对象的方法和设备
CN110807210B (zh) 一种信息处理方法、平台、系统及计算机存储介质
CN1851606A (zh) 一种版权信息处理方法及系统
CN115001716B (zh) 教育一体机的网络数据处理方法、系统和教育一体机

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20050518

C20 Patent right or utility model deemed to be abandoned or is abandoned